<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://m365journey.blog/2025/08/25/gouvernance-ia-avec-microsoft-defender-for-cloud-apps-comment-maitriser-le-shadow-ai-en-2025/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/shadowai.png</image:loc><image:title>shadowai</image:title></image:image><lastmod>2025-08-25T06:22:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2025/08/18/comptes-dacces-durgence-microsoft-entra-id-guide-complet-2025/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/icebreak-2.png</image:loc><image:title>icebreak 2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/comptes-brise-glace-m365.png</image:loc><image:title>comptes-brise-glace-m365</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/icebreak.png</image:loc><image:title>icebreak</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/capture-entra-1.png</image:loc><image:title>Entra ID password</image:title></image:image><lastmod>2025-08-18T13:39:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2025/08/11/permissions-deleguees-vs-permissions-dapplication-dans-microsoft-entra-id-demystifier-les-autorisations-oauth-2-0/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/microsoft-entra-id.jpg</image:loc><image:title>microsoft-entra-id</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/jpeg.png</image:loc></image:image><lastmod>2025-08-11T06:07:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2025/08/06/direct-send-microsoft-365-quand-une-fonctionnalite-pratique-devient-une-faille-de-securite-critique/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2025/08/directsend.png</image:loc><image:title>directsend</image:title></image:image><lastmod>2025-08-06T08:31:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/my-philosophy/</loc><lastmod>2024-10-17T07:14:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365journey.blog/2024/10/16/annonce-importante-oghma-site-devient-m365-journey-decouvrez-notre-nouvelle-identite/</loc><lastmod>2024-10-16T10:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2024/09/11/alerte-mcas-power-automate/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/09/power_automate_de_microsoft_365.png</image:loc><image:title>Power_Automate_de_Microsoft_365</image:title></image:image><lastmod>2024-09-11T13:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2024/08/23/outlook-outils-de-diagnostique/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/outlook-diags.png</image:loc><image:title>outlook diags</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2024/08/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-23T08:16:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/08/28/comment-utiliser-azure-information-protection-pour-proteger-les-donnees-sensibles-de-votre-entreprise-contre-la-fuite-et-le-vol/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/08/aip.png</image:loc><image:title>AIP</image:title></image:image><lastmod>2023-08-28T11:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/05/15/azure-token-protection/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/coollogo_com-23359734.png</image:loc><image:title>coollogo_com-23359734</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/azure-ac-token-session3.png</image:loc><image:title>azure-ac-token-session3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/azure-ac-token-session2.png</image:loc><image:title>azure-ac-token-session2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/azure-ac-token-session.png</image:loc><image:title>azure-ac-token-session</image:title></image:image><lastmod>2023-05-26T06:36:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/05/17/actions-protegees-pour-les-strategies-dacces-conditionnel-azure-ad/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/coollogo_com-10202429.png</image:loc><image:title>coollogo_com-10202429</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/context4.png</image:loc><image:title>context4</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/context3.png</image:loc><image:title>context3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/context2.png</image:loc><image:title>context2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/05/context1.png</image:loc><image:title>context1</image:title></image:image><lastmod>2023-05-17T08:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/13/vider-le-cache-teams/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/cache-teams.png</image:loc><image:title>cache-teams</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/teams-cache.jpg</image:loc><image:title>Teams Cache</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-14T10:03:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/04/14/les-outils-et-raccourcis-pour-optimiser-son-temps-dans-le-cloud-microsoft/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/04/optimization.png</image:loc><image:title>optimization</image:title></image:image><lastmod>2023-04-14T10:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/20/comparatif-entre-les-mots-de-passe-et-le-passwordless/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/passvspass.jpg</image:loc><image:title>passvspass</image:title></image:image><lastmod>2023-04-14T10:01:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/15/comment-mettre-en-place-une-strategie-de-gestion-des-identites-et-des-acces-avec-azure-active-directory-pour-securiser-lacces-aux-applications-et-donnees-de-votre-entreprise/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/what-is-identity-management.jpeg</image:loc><image:title>Manager Pushing IDENTITY &amp; ACCESS MANAGEMENT</image:title><image:caption>Manager pushing IDENTITY &amp; ACCESS MANAGEMENT on a virtual interactive touch screen. Business metaphor and computer security procedure concept for technology enabling access to authenticated users.</image:caption></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/the-4-pillars-of-identity-management-governance-venn-diagram.jpg</image:loc><image:title>The-4-Pillars-of-Identity-Management-Governance-venn-diagram</image:title></image:image><lastmod>2023-03-15T14:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2021/04/25/comment-lintelligence-artificielle-et-le-machine-learning-revolutionnent-lentreprise/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/ai.jpg</image:loc><image:title>Big,Data,And,Artificial,Intelligence,Concept.,Machine,Learning,And,Cyber</image:title></image:image><lastmod>2023-03-08T12:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2021/08/19/conseils-de-cybersecurite-pour-les-entreprises/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/cybersecurity.jpg</image:loc><image:title>cybersecurity</image:title></image:image><lastmod>2023-03-08T12:35:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2022/01/02/comment-lia-et-lapprentissage-automatique-redefinissent-la-cybersecurite/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/machine-learning.jpg</image:loc><image:title>machine learning</image:title></image:image><lastmod>2023-03-08T12:35:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2022/05/29/blockchain/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/blockchain.jpg</image:loc><image:title>blockchain</image:title></image:image><lastmod>2023-03-08T12:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2022/08/28/blockchain-as-a-service/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/blockchain2.jpg</image:loc><image:title>blockchain2</image:title></image:image><lastmod>2023-03-08T12:34:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/01/13/auditer-les-connexions-power-automate/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/power-automate.jpg</image:loc><image:title>Power Automate</image:title></image:image><lastmod>2023-03-08T12:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/01/les-fuites-de-donnees-en-entreprise/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/cybersecurite.jpg</image:loc><image:title>cybersecurite</image:title></image:image><lastmod>2023-03-08T12:34:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/02/les-bonnes-pratiques-des-mots-de-passe-en-entreprise-en-2023/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/goal-plan-action-2023.png</image:loc><image:title>Goal Plan Action 2023</image:title></image:image><lastmod>2023-03-08T12:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/06/passwordless-la-nouvelle-facon-de-se-connecter-en-toute-securite/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/passwordless.png</image:loc><image:title>passwordless</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/four-steps-passwordless-strategy.png</image:loc><image:title>four-steps-passwordless-strategy</image:title></image:image><lastmod>2023-03-08T12:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2023/03/08/vulnerabilites-des-coffres-forts-de-mots-de-passe/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/03/coffrefort-numerique.jpg</image:loc><image:title>coffrefort numérique</image:title></image:image><lastmod>2023-03-08T10:52:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2021/01/03/quest-ce-quun-reseau-prive-virtuel-vpn-et-quels-sont-ses-avantages/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2023/01/vpn.jpg</image:loc><image:title>VPN</image:title></image:image><lastmod>2023-01-11T13:34:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/10/25/importer-un-fichier-pst-dans-office-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/10/outlook-to-office365.jpg</image:loc><image:title>Outlook to Office365</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/12/azure-storage-explorer.jpg</image:loc><image:title>Azure-Storage-Explorer</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/12/azure-azcopy-tool.jpg</image:loc><image:title>Azure-AzCopy-Tool</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/12/import-data-to-office-365-1024x490-1.jpg</image:loc><image:title>Import-data-to-Office-365-1024x490</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/12/assign-mail-import-export-role-in-exchange.jpg</image:loc><image:title>Assign-mail-import-export-role-in-exchange</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/12/import.jpg</image:loc><image:title>import</image:title></image:image><lastmod>2023-01-11T13:04:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/09/17/comment-activer-de-nouvelles-fonctionnalites-dans-microsoft-teams/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/09/teams.png</image:loc><image:title>Teams</image:title></image:image><lastmod>2020-09-18T08:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/a-propos/</loc><lastmod>2020-09-09T20:16:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365journey.blog/2020/08/17/quelle-est-la-difference-entre-lantivirus-et-lantimalware/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/08/antivirus.jpg</image:loc><image:title>Antivirus</image:title></image:image><lastmod>2020-08-17T13:31:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/08/04/comment-liot-transforme-les-systemes-de-securite/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/08/iot.jpg</image:loc><image:title>IoT</image:title></image:image><lastmod>2020-08-04T09:01:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/05/30/nettoyer-le-registre-de-windows-en-2020/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/ccleaner.jpg</image:loc><image:title>ccleaner</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/auslogics-registry-cleaner_1.png</image:loc><image:title>Auslogics-Registry-Cleaner_1</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/windows10.png</image:loc><image:title>windows10</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/registre2.jpg</image:loc><image:title>registre2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/registre.jpg</image:loc><image:title>registre</image:title></image:image><lastmod>2020-05-30T10:58:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/02/11/effacer-lespace-libre-sur-un-disque-ssd/</loc><lastmod>2020-05-20T09:07:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2015/08/29/verifiez-un-hachage-de-fichier-md5-avec-powershell/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2015/08/md5ps.jpg</image:loc><image:title>MD5PS</image:title></image:image><lastmod>2020-05-20T09:07:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/05/15/ransomware-as-a-service/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/05/raas3.png</image:loc><image:title>raas3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/05/raas2.png</image:loc><image:title>raas2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/05/raas1.png</image:loc><image:title>raas1</image:title></image:image><lastmod>2020-05-15T08:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/02/28/best-practices-2020-gestion-des-acces-et-identites/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/02/embed-sample-for-customers.png</image:loc><image:title>embed-sample-for-customers</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/02/apps-secure-passwords.png</image:loc><image:title>apps-secure-passwords</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/02/top-passwords.png</image:loc><image:title>top-passwords</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/02/cloud-home-sensitive-data.png</image:loc><image:title>cloud-home-sensitive-data</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/02/conditional-access-overview.png</image:loc><image:title>conditional-access-overview</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/best-practices-2020.jpg</image:loc><image:title>2020 new year goal,plan,action text on notepad on wood background.Business challenge.Inspiration ideas</image:title><image:caption>2020 new year goal,plan,action text on notepad on wood background.Business challenge.Inspiration ideas.Human performance</image:caption></image:image><lastmod>2020-05-08T10:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/05/08/best-practices-2020-les-mots-de-passe/</loc><lastmod>2020-05-08T10:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/29/onedrive-partagez-en-toute-securite-vos-fichiers-et-dossiers-avec-des-personnes-exterieures-a-votre-organisation/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/onedrive4.jpg</image:loc><image:title>onedrive4</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/onedrive3.png</image:loc><image:title>onedrive3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/onedrive2.jpg</image:loc><image:title>onedrive2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/onedrive1.jpg</image:loc><image:title>onedrive1</image:title></image:image><lastmod>2020-04-29T09:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/12/23/pourquoi-la-gestion-des-couts-pour-votre-cloud-est-au-dela-de-lessentiel/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/solutions-diagrams-cloud-expense-management-2-01.png</image:loc><image:title>Solutions-Diagrams-Cloud-Expense-Management-2-01</image:title></image:image><lastmod>2020-04-28T08:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/10/20/gestionnaire-de-mots-de-passe-keepass/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/keepass-head.png</image:loc><image:title>keepass-head</image:title></image:image><lastmod>2020-04-27T10:25:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/04/09/in-depth-1/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2017/04/metadefender-threat-intelligence-feeds-pr.jpg</image:loc><image:title>Hacker spy your data file</image:title><image:caption>Hacker spy your data file</image:caption></image:image><lastmod>2020-04-26T17:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/11/24/office-365-authentification-de-base-a-moderne/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/11/basic-auth.png</image:loc><image:title>basic-auth</image:title></image:image><lastmod>2020-04-25T14:53:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/01/04/comment-et-ou-proteger-vos-donnees-sensibles-dans-office-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/01/sensitiva_data.png</image:loc><image:title>sensitiva_data</image:title></image:image><lastmod>2020-04-25T14:48:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/05/3-nouvelles-fonctionnalites-microsoft-teams-que-vous-devez-commencer-a-utiliser/</loc><lastmod>2020-04-25T14:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/25/quelle-est-la-difference-entre-la-protection-didentite-azure-active-directory-aip-et-lacces-conditionnel-azure-ac/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/microsoft-azure.png</image:loc><image:title>microsoft-azure</image:title></image:image><lastmod>2020-04-25T14:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/06/24/lacces-invite-guest-access-peut-faire-de-teams-un-outil-puissant-pour-votre-organisation/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/06/guest-access.jpg</image:loc><image:title>Guest-Access</image:title></image:image><lastmod>2020-04-24T16:29:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/05/06/outlook-backup-addin/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/outlook.jpg</image:loc><image:title>outlook</image:title></image:image><lastmod>2020-04-24T15:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/04/29/azure-information-protection-aip-pour-office-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/04/aip.jpg</image:loc><image:title>aip</image:title></image:image><lastmod>2020-04-24T15:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/04/26/lemplacement-des-donnees-office-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/04/datecenters.jpg</image:loc><image:title>datecenters</image:title></image:image><lastmod>2020-04-24T15:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/04/25/disponibilite-du-module-powershell-de-microsoft-teams/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/04/teams.jpg</image:loc><image:title>teams</image:title></image:image><lastmod>2020-04-24T14:12:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2014/06/07/reset-the-net/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2014/06/resetthenet.png</image:loc><image:title>resetthenet</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2014/06/other-ressources.jpg</image:loc><image:title>Other-Ressources</image:title></image:image><lastmod>2020-04-24T13:30:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/06/16/comment-les-strategies-dlp-data-loss-prevention-fonctionnent-elles-dans-office-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/06/data-loss-prevention-1.jpg</image:loc><image:title>3D rendering hacking technology interface on blue background</image:title><image:caption>3D rendering hacking technology interface on blue background</image:caption></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/06/analytics-screenshot.png</image:loc><image:title>analytics-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/sample-details-screenshot.png</image:loc><image:title>sample-details-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/samples-screenshot.png</image:loc><image:title>samples-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/test-policy-screenshot.png</image:loc><image:title>test-policy-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/notification-settings-screenshot.png</image:loc><image:title>notification-settings-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/content-settings-screenshot.png</image:loc><image:title>content-settings-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/overview-screenshot.png</image:loc><image:title>overview-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/category-screenshot.png</image:loc><image:title>category-screenshot</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/data-loss-prevention-screenshot.png</image:loc><image:title>Data-loss-prevention-screenshot</image:title></image:image><lastmod>2020-04-24T09:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/09/16/ne-soyez-pas-victime-du-ransomware/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/ransomware.png</image:loc><image:title>ransomware</image:title></image:image><lastmod>2020-04-24T09:30:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/11/04/interface-de-scan-anti-programme-malveillant/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/amsi.jpg</image:loc><image:title>amsi</image:title></image:image><lastmod>2020-04-24T09:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/10/06/la-preview-du-scanner-aip-detiquetage-unifie-apporte-une-mise-a-lechelle-et-bien-plus-encore/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/aip.png</image:loc><image:title>aip</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/scanner-diagram-v4.jpg</image:loc><image:title>scanner diagram v4</image:title></image:image><lastmod>2020-04-24T08:41:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/12/22/microsoft-teams-est-desormais-disponible-sur-linux/</loc><lastmod>2020-04-24T07:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/03/10/les-tendances-du-cloud-en-2019-la-gestion-du-cloud-est-lobjectif-principal/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/cloud-computing-2019.png</image:loc><image:title>cloud-computing-2019</image:title></image:image><lastmod>2020-04-24T06:57:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/11/10/pourquoi-les-plans-de-reprise-apres-sinistre-bases-sur-le-cloud-sont-plus-fiables-que-les-autres/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/disaster-recovery-cloud.png</image:loc><image:title>disaster-recovery-cloud</image:title></image:image><lastmod>2020-04-24T06:34:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/12/14/calculez-le-stockage-utilise-par-les-groupes-office-365-a-laide-de-powershell/</loc><lastmod>2020-04-23T22:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/02/03/comment-configurer-la-reinitialisation-de-mot-de-passe-en-libre-service-dans-azure-ad-connect-sspr/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-6.png</image:loc><image:title>self-service-password-reset-6</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-5.png</image:loc><image:title>self-service-password-reset-5</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-4.png</image:loc><image:title>self-service-password-reset-4</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-3.png</image:loc><image:title>self-service-password-reset-3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-2.png</image:loc><image:title>self-service-password-reset-2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/self-service-password-reset-1.png</image:loc><image:title>self-service-password-reset-1</image:title></image:image><lastmod>2020-04-23T22:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/01/18/comment-identifier-un-vrai-site-web-par-rapport-a-un-site-web-de-phishing/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-5.jpeg</image:loc><image:title>Unknown-5</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-4.jpeg</image:loc><image:title>Unknown-4</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-3.jpeg</image:loc><image:title>Unknown-3</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-2-1.jpeg</image:loc><image:title>Unknown-2-1</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-1-1.jpeg</image:loc><image:title>Unknown-1-1</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/unknown-2.jpeg</image:loc><image:title>Unknown-2</image:title></image:image><lastmod>2020-04-23T21:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/07/proteger-lacces-aux-donnees-de-lorganisation-sur-les-appareils-personnels/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/enable-ca-policy.jpg</image:loc><image:title>enable-ca-policy</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/require-approved-client-app-grant-control.jpg</image:loc><image:title>require-approved-client-app-grant-control</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/device-platform-condition.jpg</image:loc><image:title>device-platform-condition</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/offic-365-exchange-online-cloud-app.jpg</image:loc><image:title>offic-365-exchange-online-cloud-app</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/conditional-access-assignments.jpg</image:loc><image:title>conditional-access-assignments</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/policy-assignments-768x355-1.jpg</image:loc><image:title>policy-assignments-768x355</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/access-requirements-768x632-1.jpg</image:loc><image:title>access-requirements-768x632</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/data-protection-settings-768x613-1.jpg</image:loc><image:title>data-protection-settings-768x613</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/apps-configuration-for-outlook-768x403-1.jpg</image:loc><image:title>apps-configuration-for-outlook-768x403</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/protection-policy-768x335-1.jpg</image:loc><image:title>protection-policy-768x335</image:title></image:image><lastmod>2020-04-23T21:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/03/05/sursis-pour-les-authentifications-basiques/</loc><lastmod>2020-04-23T20:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/09/21/fin-du-support-des-vieilles-technos/</loc><lastmod>2020-04-23T20:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/11/25/configurer-multi-factor-authentification-mfa/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/11/mfa.png</image:loc><image:title>MFa</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/11/enablemodernauth.png</image:loc><image:title>enablemodernauth</image:title></image:image><lastmod>2020-04-23T20:33:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/10/27/parametres-smtp-doffice-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2018/10/protocole-smtp.jpeg</image:loc><image:title>Protocole-SMTP</image:title></image:image><lastmod>2020-04-23T20:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/16/office-365-devient-microsoft-365/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/teams-public.png</image:loc><image:title>teams-public</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/office365-microsoft365.jpg</image:loc><image:title>office365-microsoft365</image:title></image:image><lastmod>2020-04-23T19:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2020/04/20/principales-fonctionnalites-doffice-365-atp-advanced-threat-protection/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/office-365-advanced-threat-protection-diagram.jpg</image:loc><image:title>Office-365-Advanced-Threat-Protection-Diagram</image:title></image:image><lastmod>2020-04-23T18:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/08/07/vous-avez-maintenant-2-ans-pour-passer-de-skype-entreprise-a-microsoft-teams/</loc><lastmod>2020-04-23T17:46:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/05/20/mettez-a-jour-votre-score-securite-doffice-365-consultez-votre-score-en-fonction-dorganisations-de-taille-similaire/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/05/secure-score.jpg</image:loc><image:title>secure score</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/05/securescore-time2.png</image:loc><image:title>securescore-time2</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/05/securescore-time.png</image:loc><image:title>securescore-time</image:title></image:image><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/05/securescore-compare.png</image:loc><image:title>securescore-compare</image:title></image:image><lastmod>2020-04-23T17:38:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/06/16/que-faire-lorsquun-compte-office-365-est-compromis/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2019/06/office-365-compromised.jpg</image:loc><image:title>office-365-compromised</image:title></image:image><lastmod>2020-04-23T17:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/12/17/les-paires-de-regions-azure-pour-la-reprise-apres-incident-pra-et-la-continuite-du-business-pca/</loc><lastmod>2020-04-23T16:58:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/08/24/gerer-precisement-qui-peut-creer-des-groupes-office-365/</loc><lastmod>2020-04-23T16:49:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/09/06/comment-le-vpn-fournit-un-tunnel-securise-a-votre-cloud/</loc><lastmod>2020-04-23T15:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2019/01/14/gouvernance-du-cloud-un-facteur-cle-dans-ladoption-du-cloud/</loc><lastmod>2020-04-23T15:30:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2018/08/17/les-menaces-communes-dans-le-cloud/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2020/04/cloud-threats.jpeg</image:loc><image:title>cloud threats</image:title></image:image><lastmod>2020-04-23T14:59:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/04/04/annonce-de-la-release-de-threat-intelligence-et-advanced-data-governance-et-mises-a-jour-de-advanced-threat-protection/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2017/04/atp.jpg</image:loc><image:title>ATP</image:title></image:image><lastmod>2020-04-23T14:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/2017/03/16/threat-intelligence-feeds/</loc><image:image><image:loc>https://m365journey.blog/wp-content/uploads/2017/03/threat_intelligence_feeds.jpg</image:loc><image:title>Threat_Intelligence_Feeds</image:title></image:image><lastmod>2020-04-23T14:33:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m365journey.blog/contact/</loc><lastmod>2020-04-23T14:22:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m365journey.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-25T06:22:05+00:00</lastmod></url></urlset>
